Select Page
The top technical skills for the modern IT Pro

The top technical skills for the modern IT Pro

There are many niche areas within infrastructure and security, but we find that most IT Pros have a very broad set of responsibilities, touching different products and tasks. If you’re working in a Microsoft-focussed environment, especially one that is using ... continue reading
Holistic compromised identity signals from Microsoft

Holistic compromised identity signals from Microsoft

Hey there! We are delighted to announce the general availability of four new detections in Azure Active Directory (Azure AD) Identity Protection, further expanding our identity threat detection surface area in cloud applications and at endpoints to enhance our comprehensive ... continue reading
Screenshot of an application UI with lines of code. One of said code lines is highlighted, with an annotation written in a non-English language.

SpringShell RCE vulnerability: Guidance for protecting against and detecting CVE-2022-22965

On March 31, 2022, vulnerabilities in the Spring Framework for Java were publicly disclosed. Microsoft is currently assessing the impact associated with these vulnerabilities. This blog is for customers looking for protection against exploitation and ways to detect vulnerable installations ... continue reading
edzonca_0-1648787161771.png

A Starting Point for Monitoring Azure

Hi All, Well, usually we concentrate on the monitoring of Azure Resources, as component, for example, how I can monitor my VM or my Apps, but Is also important, check the Azure Infrastructure. Not our resources in Azure, but the ... continue reading
Space development pipeline from earth to satellite.

Empowering space development off the planet with Azure

Any developer can be a space developer with Azure. Microsoft has a long history of empowering the software development community. We have the world’s most comprehensive developer tools and platforms from Github to Visual Studio, and we support a wide ... continue reading
Decorative image illustrating Microsoft 365 Defender's staples for protecting against ransomware.

Microsoft protects against human-operated ransomware across the full attack chain in the 2022 MITRE Engenuity ATT&CK® Evaluations

For the fourth year in a row, the independent MITRE Engenuity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) Evaluations demonstrated Microsoft’s strong detection and protection capabilities thanks to our multi-platform extended detection and response (XDR) defenses. The ever-evolving threat landscape ... continue reading

3 strategies to launch an effective data governance plan

Aware of the potential risks of sensitive data if not managed properly, you’ve undertaken a data discovery process to learn where it’s all stored. You’ve classified this sensitive data—confidential information like credit card numbers and home addresses collected from customers, ... continue reading
Azure VMware Solution (AVS) for VMware Admins - Assessment and Migration

Azure VMware Solution (AVS) for VMware Admins – Assessment and Migration

Assessing your environment There are many tools you may or not be familiar with, depending on your background to, assess which workloads are eligible to migrate to Azure VMware Solution. Microsoft offers Azure Migrate where you can download an OVA ... continue reading
Microsoft Defender for Cloud Dashboard featuring security posture chart, Firewall manage, regulatory compliance status, and workload protections.

3 steps to secure your multicloud and hybrid infrastructure with Azure Arc

As businesses around the world grapple with the growth of an industrialized, organized attacker ecosystem, the need for customers to secure multicloud and hybrid infrastructure and workloads is increasingly urgent. Today, organizations face an attacker ecosystem that is highly economically ... continue reading
AlanLaPietra_0-1648554341870.png

Microsoft Defender Ecosystem

DEFENDER FOR CLOUD Microsoft Defender for Cloud - an introduction | Microsoft Docs Defender for Cloud is a tool for security posture management and threat protection. It strengthens the security posture of your cloud resources, and with its integrated Microsoft ... continue reading